1. S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Technical Report, Department of Computer Engineering, Chalmers University, 2000.
2. A. Ghosh, A. Schwartzbard, and M. Schatz, “Learning program behavior profiles for intrusion detection,” in Proc. 1st Workshop Intrusion Detection and Network Monitoring. Berkeley, CA, USA: USENIX Association, 1999, pp. 51–62.
3. D. C. Plummer, “RFC 826: An Ethernet Address Resolution Protocol, Or, Converting Network Protocol Addresses to 48 bit Ethernet Addresses for Transmission on Ethernet Hardware,” IETF, Nov. 1982.
4. J. Postel, “RFC 792: Internet Control Message Protocol,” IETF, Sept. 1981.
5. H. Neminath, S. Biswas, S. Roopa, R. Ratti, S. Nandi, F. A. Barbhuiya, A. Sur, and V. Ramachandran, “A DES approach to intrusion detection system for ARP spoofing attacks,” in Proc. 18th Mediterranean Conf. Control and Automation, Marrakech, Morocco, 2010, pp. 695–700.